Using Genetic Algorithm With Simulated Annealing To Solve Rubik Cube
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.1-6, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.16
Abstract
The Rubik cube is 3D puzzle with 6 different colored faces. The classic puzzle is a 3x3x3 cube with 43 quintillion possible permutations having a complexity of NP-Hard. In this paper, new metaheuristic approaches based on Simulated Annealing (SA) and Genetic Algorithm (GA) proposed for solving the cube. The proposed algorithms are simulated in Matlab software and tested for 100 random test cases. The simulation results show that the GA approach is more effective in finding shorter sequence of movements than SA, but the convergence speed and computation time of the SA method is considerably less than GA. Besides, the simulation of GA confirms the claim that the cube can be solved with maximum 22 numbers of movements.
Key-Words / Index Term
Rubik Cube, Simulated Annealing, Genetic Algorithm
References
[1] El-Sourani,N., Hauke, S., Borschbach, M. An evolutionary approach for solving the Rubik’s cube incorporating exact methods. EvoApplications, Part I, LNCS 6024, 80-89, 2010.
[2] Korf,R.E. Finding optimal solutions for Rubik’s cube using pattern databases, American Association for Artificial Intelligence. (www.aaai.org), 1997.
[3] Lee,D., Miller, W. A prolog program and demonstration of an efficient heuristic search method, Ziff-Davis magazine, 2(4), 1997.
[4] Kapadia,M., Deshpande, M.V., Umale, J. Rubik’s heuristic, Mumbai, India, Electro Info-Com, 2007.
[5] Kirkpatrick,S., Gelatt, C.D., Vecchi, M.P. Optimization by Simulated Annealing, Science 220, 1983.
[6] Aarts,E.H.L., Korst, H.H.M. Simulated Annealing and Boltzmann Machines, Wiley,Chichester, 1989.
[7] El-Sourani,N., Hauke, S., Borschbach, M. Design and Comparison of two Evolutionary Approaches for Solving the Rubik’s Cube, Parallel Problem Solving from Nature,PPSN XI, 442-451, 2010.
[8] El-Sourani,N. Design and Benchmark of different Evolutionary Approaches to Solve the Rubik`s Cube as a Discrete Optimization Problem. Diploma Thesis, WWU Muenster, Germany, 2009.
[9] Anil, K. S., Solution for Rubik’s Cube by Using Genetic Algorithm, International Journal of Engineering Sciences & Research Technology, 636-641, 2015.
[10] Mantere, T., Solving Rubik`s cube with cultural algorithm, unpublished, 2012.
[11] Smith, R. J., Kelly, S., Heywood, M. I., Discovering Rubik`s Cube Subgroups using Co-evolutionary GP: A Five Twist Experiment, GECCO `16 Proceedings of the Genetic and Evolutionary Computation Conference, 789-796, 2016.
[12] Hewa Majeed Zangana "A New Algorithm for Shape Detection",IOSR-JCE, Vol. 19, Issue 3, pp. 71-76, 2017.
[13] K. Nandhini, B. Gomathi, "Implementation of LSB Based Steganography Algorithms in FPGA", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.5, pp.32-37, 2018
[14] Riddhi H.Shaparia, Narendra M.Patel, Zankhana H. Shah, "Flower Classification using Different Color Channel",International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.2, pp.1-6, 2019
Citation
Hewa Majeed Zangana, "Using Genetic Algorithm With Simulated Annealing To Solve Rubik Cube," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.1-6, 2020.
Landslide Type Prediction using Random Forest Classifier
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.7-11, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.711
Abstract
This paper talks about the prediction of types of landslides. It employs Random Forest Classifier technique, the ensemble version of Decision Trees. The results of the experiment show that ensemble techniques provide a better result compared to other algorithms. The dataset used here, in this paper, is Landslides After Rainfall dataset from NASA. This model achieves 59% accuracy without feature selection and 84% accuracy with feature selection.
Key-Words / Index Term
Artificial Intelligence, Machine Learning, Decision Tree, Ensemble Learning, Random Forest Classifier
References
[1]
Gwo-Fong Lina,
Ming-JuiChanga, Ya-ChiaoHuanga, b and Jui-Yi Hob, “Assessment of susceptibility to rainfall-induced
landslides using improved self-organizing linear output map, support vector
machine, and logistic regression”, Elsevier., vol. 224, pp. 62-74, May 2017.
[2] J.N. Goetz, A. Brenning, H. Petschko and
P.Leopold, “Evaluating machine learning and statistical prediction
techniques for landslide susceptibility modeling”, Elsevier., vol. 81, pp. 1-11, August 2015.
[3]
M.T.
Brunettia, M. Melilloa, S. Peruccaccia, L. Ciabattaa, b, L. Broccaa, “How
far are we from the use of satellite rainfall products in landslide
forecasting?”, Elsevier., vol. 210, pp. 65-75, June 2108.
[4]
MilošMarjanović, MilošKovačević, BranislavBajat, VítVoženílek, “Landslide susceptibility assessment
using SVM machine learning algorithm”, Elsevier.,
vol. 123, pp. 225-234, November 2011.
[5] Milošmarjanovic;branislavbajat; miloškovacevic,
“Landslide Susceptibility Assessment with Machine Learning Algorithms”,
International Conference on Intelligent Networking and Collaborative Systems,
pp. 273-278, December 2009.
[6] Cheng Lian, Zhigang Zeng, Wei Yao and Huiming Tang, “Performance of Combined
Artificial Neural Networks for Forecasting Landslide Displacement”, International
Joint Conference on Neural Networks (IJCNN), pp. 418-423, July 2014.
[7]
Cheng Lian, C.
L. Philip Chen, Zhigang Zeng, Wei Yao, and Huiming Tang, “Prediction Intervals for Landslide Displacement Based
on Switched Neural Networks”, IEEE
Transactions on Reliability., vol. 65,
pp. 1483-1495,
September 2016.
[8]
Yu
Huang, Lu Zhao, “Review on landslide susceptibility mapping using support
vector machines”, Elsevier., vol. 165, pp. 520-529, June 2018.
[9] MunirahRadinMohd Mokhtar, Abdul Nasir Matori and
Khamaruzaman,
“Observing Landslide Occurrence by GIS Approach”, IEEE 4th Control and System Graduate Research Colloquium., pp. 21-26, August 2013.
[10] Gege Jiang, Yuan
Tian and Chenchao Xiao, “GIS-based Rainfall-Triggered Landslide Warning and
Forecasting Model of Shenzhen”, 21st International Conference on
Geoinformatics, October 2013.
Citation
Harish Kumar N.G., Pooventhiran G., Karthika Renuka D., "Landslide Type Prediction using Random Forest Classifier," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.7-11, 2020.
An Enhanced Fuzzy Based Linkage Clustering Algorithm (EFCA) in High Dimensional Data
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.12-17, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.1217
Abstract
In data mining, clustering algorithm is a
powerful meta-learning tool to precisely examine the huge volume of data
created by recent applications. In particular, their major objective is to group
data into clusters such that data points are grouped in the similar cluster
when they are “similar” according to specific metrics. Several clustering
algorithms have been developed to deal with very large number of features or
with a very high number of dimensions, but they are often not practical when
the data is large in both aspects. To address these issues, this paper work, developed
an Enhanced Fuzzy based Linkage Clustering Algorithm (EFCA), which combines FCM
and cluster assignment strategy to solve the optimization problem during high dimensional
data processing. The proposed EFCA approach it can work with large volumes of
high dimensional dataset for discovering the outliers. The experimental results
shown that the proposed EFCA performance to improve 21.9% especial in terms of
Partition Accuracy (PA), Dunn Index (DI) improves 28 %, and Computational time
improves 16.4% compared with other existing clusiVAT and FensiVAT algorithms.
Key-Words / Index Term
Data mining, Big data cluster analysis, Fuzzy, Linkage
References
[1]
U. M. Fayyad, G.
Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy. Advances in Knowledge Discovery
and Data Mining. AAAI/MIT Press, 1996.
[2]
Hoppner, F.;
Klawnn, F.; Kruse, R.; Runkler, T.;. Fuzzy Cluster Analysis: “Methods for
classification, data analysis and image recognition”, John Wiley & Sons,
Inc., New York NY., 2000.
[3]
H. Gunadi,
“Comparing nearest neighbor algorithms in highdimensional space,” 2011.
[4]
T. C. Havens and
J. C. Bezdek, “An efficient formulation of the improved visual assessment of
cluster tendency (iVAT) algorithm,” IEEE Trans. Knowl. Data Eng., vol. 24, no. 5, pp. 813–822, May
2012.
[5]
D. Kumar, M.
Palaniswami, S. Rajasegarar, C. Leckie, J. C. Bezdek, and T. C. Havens,
“clusiVAT: A mixed visual/numerical clustering algorithm for big data,” in Proc.
IEEE Int. Conf. Big Data, pp. 112–117,
2013.
[6]
A. Fahad, N.
Alshatri, Z. Tari, A. Alamri, I. Khalil, A. Y. Zomaya, S. Foufou, and A.
Bouras, “A survey of clustering algorithms for big data: Taxonomy and empirical
analysis,” IEEE Trans. Emerging Topics Comput., vol. 2, no. 3, pp. 267–279, Sep. 2014.
[7]
M. Popescu, J.
Keller, J. Bezdek, and A. Zare, “Random projections fuzzy c-means (RPFCM) for
big data clustering,” in Proc. IEEE Int. Conf. Fuzzy Syst., pp. 1–6, 2015.
[8]
D. Kumar, J. C.
Bezdek, M. Palaniswami, S. Rajasegarar, C. Leckie, and T. C. Havens, “A hybrid
approach to clustering in big data,” IEEE Trans. Cybern., vol. 46, no. 10, pp.
2372–2385, Oct. 2016.
[9]
J. C. Bezdek,
Primer on Cluster Analysis: Four Basic Methods that (Usually) Work, vol. 1.
Sarasota, FL, USA: First Edition Design Publishing, 2017.
[10] P. Rathore, J. C. Bezdek, S. M. Erfani, S. Rajasegarar,
and M. Palaniswami, “Ensemble fuzzy clustering using cumulative aggregation on
random projections,” IEEE Trans. Fuzzy Syst., vol. 26, no. 3, pp.
1510–1524, Jun. 2018.
[11] P. Rathore, A. S. Rao, S. Rajasegarar, E. Vanz, J.
Gubbi, and M. Palaniswami, “Real-time urban microclimate analysis using
internet of things,” IEEE Internet Things J., vol. 5, no. 2, pp.
500–511, Apr. 2018.
[12] Punit Rathore, Dheeraj Kumar, James C. Bezdek,
Sutharshan Rajasegarar, and Marimuthu Palaniswami, "A Rapid Hybrid
Clustering Algorithm for Large Volumes of High Dimensional Data", IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 31, NO. 4, APRIL 2019.
[13] J. C. Dunn, “A fuzzy relative of the ISODATA process
and its use in detecting compact well-separated clusters,” J. Cybern., vol. 3, no. 3, pp. 32–57, 1973.
[14] P. Rathore, Z. Ghafoori, J. C. Bezdek, M. Palaniswami,
and C. Leckie, “Approximating Dunn’s cluster validity indices for partitions of
big data,” IEEE Trans. Cybern.
Citation
R. Kiruthika, V. Vijayakumar, "An Enhanced Fuzzy Based Linkage Clustering Algorithm (EFCA) in High Dimensional Data," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.12-17, 2020.
Development of Generalized Model of 3-Phase Induction Motor for Performance Study During Different Distorted and Unbalance Voltage
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.18-25, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.1825
Abstract
Due to the introduction of FACT devices in power supply system and complicated control in power industry, presence of harmonics in power supply system is a common problem. It increases day by day and it distorts and unbalances the supply voltage. Due to unequal transformer tap settings, open delta connected transformer banks, unbalanced distribution of single phase loads supply voltage unbalance may occurs. Three phase induction motor is the main workhouse of modern industries. Due to the application of such a polluted supply voltage the performance of three phase induction motor may be affected seriously and this may affect the load connected with the drive system. To take correct measure during torque and speed control, it is required to know the performance during voltage unbalance and distorted supply due to different harmonics. To mitigate this, an attempt has been made to develop a generalized model of a three phase induction motor for online performance study of torque and speed during different distorted and unbalance supply voltage. In doing this, Matlab/Simulink has been used to develop a model based on generalized theory of induction motor. Finally, using the model, performance has been studied during application of different distorted and unbalanced supply and reported.
Key-Words / Index Term
Modelling of Induction Motor, Torque and speed monitoring, Harmonics and unbalance voltage detection
References
[1]
C. Y. Lee,W. J.
Lee,Y. N. Wang,J. C. Gu,“Effects of Voltage Harmonics on the Electrical and
Mechanical Performance of a Three-phase Induction Motor”, IEEE Industrial
and Commercial Power Systems Technical Conference, pp.88-94, May 1998.
[2]
V. Indhumathi, “Maximization Technique based Efficient
Scheduling in Grid Environment”, International Journal of Scientific
Research in Computer Science and Engineering, E-ISSN: 2320-7639, Vol. 5, Issue 6, pp. 79-82, December 2017.
[3]
S. Joshi and D.K.
Rai, “Design and Simulations of Load
Management Impact on Power System”, International Journal of Scientific
Research in Computer Science and Engineering, E-ISSN: 2320-7639, Vol.6, Issue 2, pp 20-26, April 2018.
[4]
K.M. Rudrappa and
B.P. Divakar, “A Programmable System on
Chip (PSOC) for Active Power Filter (APF) Based on Cortex M3“,
International Journal of Scientific Research in Network Security and
Communication, ISSN: 2321-3256, Vol. 5,
Issue 2, pp.37-43, May 2017.
[5]
T. Jackie and C.
Hung, “Neural network Method: Loss
Minimization control of a PMSM with core Resistance Assessment“,International
Journal of Scientific Research in Network Security and Communication, ISSN:
2321-3256, Vol. 4, Issue 6, pp. 10-18, December 2016.
[6]
G Maruthi, K. P.
Vittal,“Electrical Fault Detection in
Three Phase Squirrel Cage Induction Motor by Vibration Analysis using MEMS
Accelerometer”,International Conference on Power Electronics and Drives
System,pp. 843-848, 28 November-1 December, 2005.
[7]
W.H. Kersting, “Causes and Effects of Unbalanced
Voltages Serving an Induction Motor”, Rural Electric Power conference, pp. 1-8, May 2000.
[8]
L. Xu, Y. Wang, “Dynamic modeling and control of DFIG-Based wind turbines under
unbalanced network conditions”, IEEE Transactions
on Power Systems, Vol.22, Issue 1, pp. 314 – 323, 2007.
[9]
T.K.A. Brekken, N. Mohan, “
Control of a doubly fed Induction wind
generator under unbalanced grid voltage conditions”, IEEE Transactionson Energy Conversion, Vol.22, No. 1,pp. 129 – 135, 2007.
[10] A. Ghosh, A. Das, A. Sanyal, “Effect of Saturation in Induction
Machines” International Journal of
Analysis of Electrical Machines, Vol. 4,
No. 1, pp. 25-29, 2018.
[11] A. Ghosh, A. Das, A. Sanyal, “Equivalent Circuit Parameters of a
Synchronous Machine from Manufacturer`s Data”, Annals of the Faculty of Engineering Hunedoara –
International Journal of Engineering, Vol. 16,
No. 3, pp. 127-131, 2018.
[12] A. Ghosh, A.
Das, A. Sanyal, “Transient Stability Assessment of an
Alternator Connected to Infinite Bus Through a Series Impedance Using State
Space Model”, Journal of The
Institution of Engineers (India): Series B, Vol. 100, No.5, pp. 509–513, October 2019.
[13]
L. El Menzhi, A.
Saad,“Induction motor fault diagnosis
using voltage Park components of an auxiliary winding - voltage unbalance”,International Conference on Electrical
Machines and Systems,pp. 1–6, May 2009.
[14]
A. K. Thakur, P. K.
Kundu, A. Das, “Comparative study of
induction motor faultanalysis using feature extraction”, IEEE Calcutta
Conference, pp. 150-154, December,2007.
[15]
J. M. Corres, J.
Bravo, F. J. Arregui, I. R. Matias, “Unbalance
and Harmonics Detection in Induction Motors Using an Optical Fiber Sensor”,IEEE
Sensors Journal, Vol.6, Issue3, pp. 605-612, 2006.
[16]
D. R. Sawitri, D.
A. Asfani, M. H. Purnomo, I. K. E. Purnama, M. Ashari, “Early Detection of Unbalance Voltage in Three Phase Induction Motor
Based on SVM”, 9th IEEE International Symposium on
(SDEMPED), pp. 573-578, August 2013.
[17]
A. K. Thakur, P.
K. Kundu, “Authentication of unknown
fault for a three phase induction motor by stator current spectral analysis”,
2nd International Conference on Control,Instrumentation, Energy
& Communication(CIEC), pp. 279-283,
January 2016.
[18]
A.R.Sedighi,“A new model for high impedence fault in
electrical distribution systems”, International Journal of Scientific
Research in Computer Science and Engineering, Vol. 2, Issue 4, pp. 6-12, August2014.
[19]
M.L. Sin, W.L. Soong and N.
Ertugrul,“Induction machine on-line condition monitoring and fault
diagnosis - a survey”, AUPEC2003:Australasian Universities Power Engineering Conference,
Christchurch, New Zealand. pp. 1-6, 2003.
[20]
F.C. Trutt, J. Sottile, J. L. Kohler,“
Online Condition Monitoring of Induction Motor”,IEEE Transactions on
Industry Apllications, Vol. 38, No. 6, pp. 1627-1632,November/December2002.
[21]
Sang Bin Lee, Jinkyu Yang, Karim Younsi, Raj Mohan Bharadwaj, “An Online Groundwall and phase to phase
Insulation Quality Assesment Technique for AC Machine Stator Windings”,IEEE Transaction on Industry Apllications,Vol. 42, No. 4, pp. 945-957,2006.
[22]
O. Mustapha, M.
Khalil, G. Hoblos, H. Chafouk, H. Chafouk, D. Lefebvre, “On-Line Fault Detection by Using Filters Bank and Artifi`cial Neural
Networks”, Information and Communication Technologies, ICTTA `06. 2nd,
Volume: 1, pp : 1630-1634, 2006.
[23]
A. Bethge, Patrick K.-W. Lo, J. T. Phillipson, “On-Line Monitoring of Partial Discharges on Stator Windings of Large
Rotating Machines in the Petrochemical Environment”,IEEE Transactions on
Industry Applications, Vol. 34, No. 6, pp. 1359-1365, 1998.
[24]
R. Ong, J. H.
Dymond, R. D. Findlay, B. Szabados, “Shaft
Current in AC Induction Machine—An Online Monitoring System and Prediction
Rules”,IEEE
Transactions on Industry Applications, Vol. 37, No. 4, pp. 2822-2829,June/August 2001.
[25]
J. Policarpo, G.
de Abreu, J. S. de Sa, Claudio C. hado, “Harmonic
torque in three phase induction motors supplied by non sinusoidal voltages”,11thInternational Conference on
Harmonics and Quality of Power,pp. 652-657,
2004.
[26]
S. Ghanbari, P.
Sheikhzadeh-Baboli ,R. F. Naghib, “Three-Phase
Induction Motor’s Torque under Voltage Unbalance”,Global Journal of
Researches in Engineering Electrical and Electronics Engineering, Vol. 13, Issue 9, Version 1.0, pp: 29-33, 2013.
[27]
P. Pillay, M. Manyage, “Definitions of Voltage
Unbalance”, IEEE Power Engineering
Review, Vol. 22, No. 11, pp. 49–50, 2002.
[28]
S. Shah, A. Rashid, MKL Bhatti, “Direct Quadrate (D-Q)
Modeling of 3-Phase Induction Motor Using MatLab / Simulink”, Canadian Journal on Electrical and Electronics
Engineering Vol. 3, No. 5, pp. 237-243, May 2012.
[29]
K. L. Shi, T . F.
Chan, Y. K. Wong, S. L . Ho, “Modelling
and Simulation of the three-phase Induction Motor Using Simulink”,
International Journal of Electrical Engineering Education, Vol. 36, pp. 163-172, Manchester U.P, 1999.
Citation
Arunava Kabiraj Thakur, Arabinda Das, Palash Kumar Kundu, "Development of Generalized Model of 3-Phase Induction Motor for Performance Study During Different Distorted and Unbalance Voltage," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.18-25, 2020.
Automatic Segmentation of Lumen in Intravascular Ultrasound Images Using Limited Image Fit Dynamism Minimization (LIFEM) Technique
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.26-30, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.2630
Abstract
Intravascular Ultrasound (IVUS) is a surgical representational process which used to see the plasma vessels out through the conterminous blood column by blood vessels in persons to determine the amount of accretion of degenerative substantial built up at in the pericardial coronary vein which cannot be envisaged by Angiography. It harvests the vessel fractious sectional images of plasma vessels that provide the measureable and qualitative valuation of the vascular wall info about the nature of atherosclerosis abrasions as well as plaque size and shape. The credentials of lumen, media and adventitia restrictions in IVUS imaginings is essential for an effectual assessment of the atherosclerotic commemorations. During an IVUS inspection, a catheter with an ultrasound transducer is announced in the physique through a plasma container and then dragged back to appearance sequence of container cross sections. This paper accessible a one of the good-looking and collaborating methods is the Active Curve Prototypical Method (ACM) with Limited Image Fit Dynamism Minimization (LIFEM) method which has been widely used in medical imaging performance as it always produces computationally well-organized for sub-regions with incessant boundaries. In our approach preserves and deals with the boundary regularization property and sub-pixel exactitude.
Key-Words / Index Term
Intravascular ultrasound (IVUS), Vessel Fractious Sectional Images, Credentials of Lumen, Active Curve Prototypical Method (ACM) with Limited Image Fit Dynamism Minimization (LIFEM), Boundary Regularization
References
[1] Alison Noble,
Djamal Boukerroui. “Ultrasound image
segmentation a survey”, IEEE Transactions on Medical Imaging, Institute of
Electrical and Electronics Engineers, 25(28),
pp.987-1010, 2006.
[2] Michael Kass, Andrew Witkin, and Demetri Terzopoulos, “Snakes Active contour models”,International
Journal of Computer Vision, pp.321-331, 1988.
[3] Tony F.Chan, Luminita A.Vese,” Active Contour without edges”, IEEE Transactions on image
Processing, 10(2), pp.266-277, 2001.
[4] M.Sonka,
Xiangmin Zhang, M.Seibes, M.S.Bissing, S.C.DeJong, S.M.Collins, C.R.McKay, “Segmentation of intravascular ultrasound
images a knowledge-based approach”,IEEE Transactions on Medical Imaging, 14 (4), pp.719-73, 1995,
[5]
J.D.Klingensmith, R.Shekhar, D.G.Vince, “Evaluation of three-dimensional
segmentation algorithms for the identification of luminaland
medical-adventitial borders in intravascular ultrasound images”, IEEE
Transactions on Medical Imaging, 19(10),
pp.996-1011, 2000.
[6]
George D.Giannoglou, Yiannis Chatzizisis, Vassilis
Koutkias, Ioannis Kompatsiaris, Maria Papadogiorgaki, Vasileios Mezaris, Eirini
Parissi, Panagiotis Diamantopoulos, Michael G.Strintzis NicosMaglaveras,
George E.Parcharidis, George E.Louridas, “A
novel active contour model for fully automated segmentation of intravascular
ultrasound images in vivo validation in human coronary arteries”, Computers in Biology and Medicine, 37(9),pp.1292-1302. 2007.
[7] Chenyang Xu,Jerry L.Prince, “Snakes, Shapes, and gradient Vector flow”, IEEE Transactions
on Image processing, 7(3), pp.359-369, 1998.
[8] HassenLazrag, KamelAloui, Med Saber Naceur, “Automatic Segmentation of Lumen in
Intravascular Ultrasound Images Using Fuzzy Clustering and Active Contours”,
International Conference on Control, engineering & Information Technology
(CEIT’13) Proceedings Engineering & Technology, Vol.1, pp.58-63, 2013.
[9] Elisabeth Brusseau, Chris L.de Korte, Frits Mastik,
Johannes Schaar, and Anton F.W.Van der Steen, “Fully Automatic Luminal Contour Segmentation in Intracoronary
Ultrasound Imaging A Statistical
Approach”, IEEE Transactions on Medical imaging, 23(5), pp.554-566, 2004.
[10] Oddvar Husby and Havard Rue, “Estimating blood vessel areas in ultrasound images using a deformable
template model”, StatisticalModelling,
4(3), pp.211-226, 2004.
[11] P.Martin,P.Refregier, F.Goudail, F.Guerault, “Influence of the noise model on level set
active contour segmentation”, IEEE Transactions on Pattern Analysis and
Machine Intelligence, 26(6), pp.799-803, 2004.
[12] AndrewHammoude,
“Endocardial border Identification in
two-dimensional echocardiographic images, Review of Methods”,Computerized
Medical Imaging and Graphics, 22(3), pp.181-193, 1998.
[13] E. Brusseau, C.L. de Korte, F. Mastik, J. Schaar, A.F.
van der Steen, “Fully automatic luminal
contour segmentation in intracoronary ultrasound imaging”-A statistical
approach, IEEE Trans. Med. Imaging 23,
554–566, 2004.
[14] J.D. Klingensmith, R. Shekhar, D.G. Vince, “Evaluation of threedimensional segmentation
algorithms for the identification of luminal and medial-adventitial borders in
intravascular ultrasound images”, IEEE Trans. Med. Imaging 19, 996–1011, 2000.
[15] G.Sowmiya, V.Kumutha, “Facial Expression Recognition
Using Static Facial Images ”, International journal of Scientific Research in
Computer Science and Engineering , Vol.6, Issue.2, pp.72-75,2018.
Ratnesh Kumar Shukla, Ajay
Agarwal, Anil Kumar Malviya, “An Introduction of Face Recognition and Face
Detection for Blurred and Noisy Images”, International journal of
Scientific Research in Computer Science and Engineering, Vol.6,
Issue.3, pp.39-43,2018.
Citation
C. Priyanka, M. Vanitha, S. Anitha, "Automatic Segmentation of Lumen in Intravascular Ultrasound Images Using Limited Image Fit Dynamism Minimization (LIFEM) Technique," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.26-30, 2020.
A Survey on Early Detection and Prediction of Heart Diseases using Machine Learning and Data Mining Techniques
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.31-34, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.3134
Abstract
Cardio vascular disease is the most prominent cause of death worldwide. Machine Learning Algorithms can be used for predicting chances of heart disease occurrence. Relating machine learning and data mining methods is a strategic approach to consume large volumes of available Cardio-related data for prediction. The datasets used are classified in terms of medical parameters. In this paper, numerous algorithms and techniques are discussed that are used in prediction of Cardio Vascular Diseases. Fast Correlation-Based Feature Selection (FCBF) method to filter noise data to improve quality of heart disease classification. K-Nearest Neighbour, Support Vector Machine, Naïve Bayes, Random Forest and a Multilayer Perception, Artificial Neural Network optimized by Particle Swarm Optimization (PSO) combined with Ant Colony Optimization (ACO) are the classification algorithms used. By using machine learning algorithms and deep learning it provides numerous ways for the prediction of the heart disease. There are various methods which provide us an information and these are applied to various datasets to get particular results.
Key-Words / Index Term
Heart Disease, Predictive Analysis, Naïve Bayes, Decision Tree, SVM
References
[1]. Youness
Khourdifi Mohamed Bahaj, ”Heart Disease Prediction and Classification Using
Machine Learning Algorithms Optimized by Particle Swarm Optimization and Ant
Colony Optimization”, International Journal Of Intelligent Engineering and System, October-2018.
[2].
S.Kavitha, K.R.Baskaran,S.Sathyavathi, ”Heart Disease with Risk Prediction
using Machine Learning Algorithms”, International Journal of Recent Technology
and Engineering (IJRTE), ISSN: 2277-3878,
Volume:7 ,Issue:4S, pp. 314-317, November
2018.
[3].
SenthilKumar Mohan, Chandrasegar Thirumalai, and Gautam Srivastava, “Effective
Heart Disease Prediction Using Hybrid Machine Learning Techniques”, IEEE Access,
ISSN:2923-707, Volume:10, July 3 2019.
[4]. Niraj
Kalantri, Kumar R, “Predictive Analysis on Heart Disease Using Different
Machine Learning Techniques”, Internation Journal of Computer Science And
Engineering, ISSN:97-101, Volume:7, Issue:2, 28-Feb-2019.
[5]. Amin Ul
Haq , Jian Ping Li ,Muhammad Hammad Memon ,Shah Nazir ,and Ruinan Sun, "A
Hybrid Intelligent System Framework for the Prediction of Heart Disease Using
Machine Learning Algorithms", Hindawi Mobile Information Systems, ISSN:3860-146, Volume: 2018, pp. 1-21
[6]. Himanshu
Sharma,M A Rizvi,"Prediction of Heart Disease using Machine Learning
Algorithms", International Journal On Recent And Innovative Trends In
Computing And Communication, ISSN: 2321-8169,
Volume:5, Issue:8, pp. 99-104, August-2017
[7]. V.V.
Ramalingam, Ayantan Dandapath, M Karthik Raja, "Heart disease prediction
using machine learning techniques", International Journal Of Engineering
And Technology, Volume:7, Issue:2.5, pp. 684-687, March 2018
[8]. Apurva
Gaikwad, M.S. Panse, “Extraction
of FECG from Non-Invasive AECG signal for Fetal Heart Rate Calculation”, ISSN:2321-3256, Volume:5, Issue:3, pp. 1069-112, 2017
[9]. Alister Dsouza, M. S. Panse, “LabVIEW based
detection of Pulse Transit Time from Plethysmogram and ECG signals for
estimation of Blood Pressure”, ISSN: 2320-7639,
Volume:5, Issue:4, pp. 36-40, 2017
Citation
Bhumika J., Rashmi R. Kotiyan, Sonal T.H., Lakshmi R., "A Survey on Early Detection and Prediction of Heart Diseases using Machine Learning and Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.31-34, 2020.
Opulent Futuristic Smart Sensing Garden
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.35-38, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.3538
Abstract
The project proposed here is an automatic public garden system which uses a PIC16F877A controller. The PIC controller is used to control the entire system. The hardware components required for this project are PIC16F877A, timer, battery, DC motor, humidity sensor, relay, solar panel, water level sensor, voice module, IR sensor. The project is an automatic design in which PIC controller controls the entire public garden system like gate, water system, lights and dustbin. Initially, the controller switches ON the entry gate that is opened for certain time, after some time the exit gate will also open. A voice indication is given to alert the public for closing time of garden then both gates will be closed. An IR sensor is fixed in the exit gate which is used to exit the people stuck inside the garden after closing time. Lights are automatically turned ON and OFF using timer. Based on humidity sensor the DC motor will supply water by using water sprinklers. If the water level in tank is beyond a certain fixed level the motor will automatically ON and fills the tank by using water level sensor. For disposal of garbage we introduce a smart garbage system which has two dustbins in which if one dustbin is filled by trash it gets automatically closed and another dustbin will be opened. The filled dustbin is indicated by LED and a message is send to the corresponding authorities for disposal. The overall power supply to the garden is generated and provided internally using a renewable energy.
Key-Words / Index Term
PIC16F877A, Timer, Moisture sensor, Water level sensor, IR sensor, GSM, Solar panel
References
[1] Pawar P M , Pawar S D,
Vare J A, “Public garden automation”,
Journal of Information, Knowledge and Research in Electronic and Communication,
Vol. 4, Issue 02, pp:1446-1449, (2016.
[2] Mr. Mahadev Vilas, Mr. MahanavarSagar, Mr.
Ingale Gaurav, Prof. Gawali D.S, “Public Garden Automation Using GSM
Technology”, International Journal for Research Trends and Innovation, Vol. 2,
Issue 3, pp:100-102, 2017.
[3] S.Abirami, M.Hemalatha, “IOT Based Indoor garden Monitoring System”,
International Journal of Contemporary Research in Computer Science and Technology,
Vol. 3, Issue 3, pp: 27-29, (2017).
[4] Norakmarbinti Arbain
sulaiman, Muhamad Dan Darrawi bin Sadli, “An
IoT-based Smart Garden with Weather Station system” IEEE paper 2019,
pp: 38-43, 2018.
[5] Ramkumar E, Nagarani S,
Roger Rozario A P, Arjunman Banu S, “Tomen:
A Plant Monitoring and Smart Gardening System uning IoT”, International
Journal of Pure and Applied Mathematics, Vol.199, Special issue, pp:703-709, 2018.
[6] R.B.Thombare, Sawakhande Pranita, Dinde
Swati, Patil Swati, “Smart Public Garden
by Using Arduino”, International
Conference on recent Innovation in Science, Engineering and Management, pp:679-683,
2018.
[7] Mallikarjunaiah H B, Prasanna Kumar, “Soil Characteristic Analysis Using IOT RM”,
International journal of computer science and engineering, Vol.7,
Special issue 15, 2019.
[8] Soham Datta, Amrita saha,
Debabrata paul, Roni jana, Amartya roy, “Realtime Monitoring of Soil Moisture for Automatic plant Watering System”,
International journal of computer science and engineering, Vol.7,Special
issue 8, 2019.
Citation
N. Vani, M. Varatharaj, P. Jayanthi, P.S. Vishal kumar, S. Maheswari, R. Nishanthakumar, "Opulent Futuristic Smart Sensing Garden," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.35-38, 2020.
Fabrication and Characterization of a Novel Eco-Friendly Plant Microbial Soil Cell
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.39-41, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.3941
Abstract
In present study our attempt is to generate electric power from plant and soil. We fabricated microbiological soil cell by using different plantand soil samples (Laterite, Red Alluvial and saline soil). Certain amount of soil sample diluted with water which act as electrolyte and Copper and Zinc plate use as positive and negative electrode respectively. Maximum value of 0.9 Volt has been obtain from cell having saline soil. Water hyacinth and gametophyte plant grown in the soilto construct plant microbiological soil cell.The plant soil cell so constructed are found to providestable voltage of about 1.5 volt per cellfor time of about one month. The cell so constructed is pollution free, eco-friendly and found to be rechargeable by adding specific quantity of water. The working model based on this research is also selected for National Level Science exhibition.
Key-Words / Index Term
Soil cell, OCV, Microbiological fuel cell
References
[1] Bombelli P,
Dennis RJ, Felder F, Cooper MB, Iyer DMR, Royles J, et al. Electricaloutput of
bryophyte microbial fuel cell systems is sufficient to power a radio or an environmental
sensor. R Soc Open Sci. 3:160249, 2016.
[2] Helder M, Chen
WS, Harst EJ, Strik DP, Hamelers HBV, Buisman CJ, et al. Electricity production
with living plants on a green roof: environmental performance of the plant‐microbial fuel cell. Biofuels BioprodBioref
7:52–64, 2013.
[3] C.J.N. Buisman,
H.V.M. Hamelers, D.P. Strik, Electricity generation with living Plants from lab
to application, Ph.D Thesis, Wageningen University, 2012.
[4] D.P. Strik, H.
V. M. Hamelers, F.H.J. Snel, C.J.N. Buisman, Green electricity production with
living plants and bacteria in a fuel cell, Wiley Inter Science, , 32, 870–876, 2008.
[5] Timmers RA,
Strik DP, Hamelers HV, Buisman CJ. Long-term performance of a plant microbial
fuel cell with Spartinaanglica. ApplMicrobiolBiotechnol;86:973–81, 2010.
[6] Bacilio-Jiménez
M, Aguilar-Flores S, Ventura-Zapata E, Pérez-Campos E, Bouquelet S, Zenteno E.
Chemical characterization of root exudates from rice (Oryzasativa) and their
effects on the chemotactic response of endophytic bacteria. Plant Soil
249:271–7, 2003.
[7] Chiranjeevi P,
Mohanakrishna G, Mohan SV. Rhizosphere mediated electrogenesis with the
function of anode placement for harnessing bioenergy through CO2 sequestration.
BioresourTechnol 124:364–70, 2012.
[8] Takanezawa K,
Nishio K, Kato S, Hashimoto K, Watanabe K. Factors affecting electric output
from rice-paddy microbe al fuel cells. BiosciBiotechnolBiochem 74:1271–3, 2010.
[9] Kaku N, Yonezawa
N, Kodama Y, Watanabe K. Plant/microbe cooperation for electricity generation
in a rice paddy field. ApplMicrobiolBiotechnol 43–9, 2008.
[10] D.P. Strik,
H. V. M. Hamelers, F.H.J. Snel, C.J.N. Buisman, Green electricity production
with living plants and bacteria in a fuel cell, Wiley Inter Science, , 32,
870–876, 2008.
[11] V. Smil, A.J.
Leggett, W.D. Philips, C.L. Harper, Visions of discovery: New light on physics,
cosmology and consciousness, Cambridge University Press, 2010.
[12] M. Gezginci, Y.
Uysal, Electricity generation using different substrates and their different
concentrations in microbial fuel cell, Journal of Environmental Protection and
Ecology, 15, 1744–1750, 2014.
[13] M Helder, D.P
Strik, H.V.M. Hamelers, C.J.N. Buisman, The flat-plate plant-microbial fuel
cell: the effect of a new design on internal resistances, Biotechnology for
Biofuels, 5, 70. 2012.
Citation
Nirbhay K Singh, Monika Singh, "Fabrication and Characterization of a Novel Eco-Friendly Plant Microbial Soil Cell," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.39-41, 2020.
An Overview on Object Detection and Recognition
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.42-45, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.4245
Abstract
The main intent of enhancing the present system of object detection is to enhance its productivity and improve the detection accuracy. The method initializes a model in a way to store the background pixels and to compare each frame pixels with the same model background pixels. The intention is to separate the background pixels with the foreground moving pixels to improve the ability to detect the object in the foreground. An improved object detection algorithm based on “Gaussian mixture model” and “three-frame difference method”. This three-frame difference method uses a dynamic segmentation threshold and edge detection technology to solve the problem of illumination mutation and discontinuity of target edge.
Key-Words / Index Term
Gaussian mixture model, illumination mutation, object detection, pixels, three-frame difference method, dynamic segmentation, edge detection technology
References
[1]
Chen, Liang-Bi & Su, Jian-Ping & Chen, Ming-Che & Chang, Wan-Jung
& Yang, Ching-Hsiang & Sie, Cheng-You,
“An Implementation of an Intelligent Assistance System for Visually
Impaired/Blind People”, IEEE Access, 12-Apr-2019.
[2]
Mahajan J.R., C.S. Rawat, “Object Detection and Tracking using Cognitive
Approach”, International Journal of Scientific Research in Network Security and
Communication, ISSN: 2321-3256, Volume:5, Issue.3, pp.136-140,
Jun-217
[3] A.
N. Zereen and S. Corraya, "Detecting real time object along with the moving
direction for visually impaired people", International Conference on
Electrical, Computer & Telecommunication Engineering (ICECTE), pp.1-4, Dec-2016.
[4] A.
Jinguji, Y. Sada and H. Nakahara, "Real-Time Multi-Pedestrian Detection in
Surveillance Camera using FPGA", International Conference on Field
Programmable Logic and Applications (FPL), Barcelona, Spain, pp.424-425,
2019.
[5] I.
Akbar and A. F. Misman, "Research on Semantics Used in GPS Based Mobile
Phone Applications for Blind Pedestrian Navigation in an Outdoor
Environment", International
Conference on Information and Communication Technology for the Muslim World
(ICT4M), pp. 196-2018.
[6] M.
Awad, J. E. Haddad, E. Khneisser, T. Mahmoud, E. Yaacoub and M. Malli,
"Intelligent eye: A mobile application for assisting blind people", IEEE
Middle East and North Africa Communications Conference (MENACOMM), pp.1-6,
2018.
[7] S.
Sharma, S. Jain and Khushboo, and Kulyukin,
Vladimir & Nicholson, John & Ross, David & Marston, James &
Gaunet, Florence, “The Blind Leading the Blind: Toward Collaborative Online
Route Information Management by Individuals with Visual Impairments”, .
International conference on Social Information Processing, pp.54-59, March
26-28, 2008.
[9] Yu,
Tianming & Yang, Jianhua & Lu, Wei, “Combining Background Subtraction
and Convolutional Neural Network for Anomaly Detection in Pumping-Unit
Surveillance”.
[10]
Baygin, Mehmet & Karakose, Mehmet & Sarimaden, Alisan & Akin, Erhan,
“An Image Processing based Object Counting
Approach for Machine Vision Application”, International Conference on Advances
and Innovations in Engineering (ICAIE),16-Feb-2018.
[11] S.
L. Joseph, X. Zhang, I. Dryanovski, J. Xiao, C. Yi and Y. Tian, "Semantic
Indoor Navigation with a Blind-User Oriented Augmented Reality", IEEE
International Conference on Systems, Man, and Cybernetics, Manchester,pp.3585-3591,
2013 .
[12] C.
K. Lakde and P. S. Prasad, "Navigation system for visually impaired
people", International Conference on Computation of Power, Energy,
Information and Communication (ICCPEIC), pp.0093-0098, 2015 .
[13] Md.T. . Akhtar, S.T. Razi, K.N. Jaman, A.
Azimusshan, Md.A. Sohel, “Fast and Real Life Object Detection System Using
Simple Webcam”, International Journal of Scientific Research in Computer
Sciences and Engineering, ISSN: 2320-7639, Volume:6, Issue.4, pp.18-23,
Aug-2018.
Citation
N. Raviteja, M. Lavanya, S. Sangeetha, "An Overview on Object Detection and Recognition," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.42-45, 2020.
High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal
Research Paper | Journal Paper
Vol.8 , Issue.2 , pp.46-51, Feb-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i2.4651
Abstract
Government organizations, citizens, businesses are being victimized by cyber-attacks, crimes, and threats. Globally people have been using cyber safety in every sector of daily life but huge numbers of criminal activities are increasing day by day using ICT tools and applications. The purpose of this paper is to explorer the high risk of cyberattacks, crime, threat and future challenges in Nepal. The study was carried out using content analysis, analysis of various survey reports and in-depth interviews with subject experts. The study claims that high risk of a cyberattack, crime, and threat have been increasing unexpectedly in various sector of Nepalese society. It is essential to make a common strategy to reduce the increasing technical risk related to cyber. The risk of cyberattack, crime, and threat is very high. So, IT audit must be made compulsory in each and every organization and original operating system as well as application software used. Strong cybersecurity precautions and technologies ought to be adopted during the installation of ICT automation. The paper claims that not only the banking sector but also the Government of Nepal should appoint cybersecurity personnel in their services so that the expert team will be able to fight against the cyber attack. As time is demanding ‘Cyber Army’ in Nepal, the Government should not delay forming a new force ‘Cyber Army’.
Key-Words / Index Term
Cyber crime, Challenges, Cyber threat, Cyber attack, IT audit, e-governance
References
[1]
Shailendra Giri. Cyber Crime, Cyber
threat, Cyber Security Strategies and Cyber Law in Nepal. Pramana Research
Journal. Vol. 9, Issue 3, PP. 662-67, 2019.
[2] Shailendra Giri and Subarna Shakya. Cybercrime,
Cyber Ethics, Cyber Law and Cyber Security. Proceeding of International
Youth Conference on Science, Technology and Innovation (IYCSTI-2019). Kathmandu,
Nepal, October 21-23, pp-594-597,
2019.
[3]
S. Shriram. Cyber Security and
Related Crimes in Indian Senario. International Journal of Current
Research, Vol. 6, Issue, 03.
pp.5403-5412, 2014
[4] Shailendra
Giri and Subarna Shakya. Cloud Computing and Data Security Challenges: A
Nepal Case. International Journal of Computer Trends and Technology. Vol. 67, Issue 3. PP 146-150, 2019.
[5] P.
SITBON. A Cyber Security Approach for Smart Meters at ERDF. Modeling Cyber
Security: Approaches, Methodology, Strategies U. Gori (Ed.). (2009). IOS
Press, Netherland. doi:10.3233/978-1-60750074-2-93.
[6]
Maurizio Martellini. Cyber Security.
Springer Cham Heidelberg New York Dordrecht,
London, 2013. DOI 10.1007/978-3-319-02279-6
[7]
Shaheen Ayyub, and Devshree Roy. Cloud Computing
Characteristics and Security Issues. International Journal of Computer
Sciences and Engineering. Vol. 1, Issue 4,
pp. 18-22, December 2013
[8] U.S. Army Training and Doctrine command. Cyber
Operations and Cyber Terrorism, Handbook No. 1.02 P.II-1 and II-3, USA., 15
August 2005
[9] L. Serena.
A Fuzzy Approach to Security Codes: Cryptography between Technological
Evolution and Human Perception Modeling Cyber Security: Approaches,
Methodology, Strategies U. Gori (Ed.) IOS Press, Netherland, 2009.
doi:10.3233/978-1-60750-074-2-43.
[10]
A.VIDALI. Striking the Balance:
Security vs. Utility. IOS Press, Netherlands, 2009.
[11] Global
Cybersecurity Index-2018. International
Telecommunication Union. ITU Publications. Published in Switzerland
Geneva, 2019.
[12] Chuda
Bahadur Roka, Cybercrime and Security in Nepal: The Need For Two-Factor
Authentication In Social Media. Crossing the Border: International Journal
of Interdisciplinary Studies, Vol. 5,
Issue 2, pp. 16-31. 15 July 2017.
DOI: https://doi.org/10.3126/ctbijis.v5i2.18436
[13]
D. Kumar and N. Panchanatham. A case study on Cyber Security in
E-Governance. International Research Journal of Engineering and Technology (IRJET).
Vol 2, Issue 8, pp 272-275, 2015.
[14]
Elias G. Carayannis and David F.J. Campbell. Cyber-Development, Cyber- Democracy and Cyber-Defense. Springer
Science+Business Media, New York, 2014. DOI: 10.1007/978-1-4939-1028-1
[15]
Shailendra Giri. E-government Use in Nepal: Issues of Database Management
and Data Security. Journal of Institute of Engineering, Tribhuvan
University, Nepal. Vol. 15, Issue 2. pp. 226-232 , 2019.
[16]
Obama, B. International
stragegy for cyberspace: Prosperity, security and openness in a network world.
The White House. USA, 2011.
[17]
Keiko Hashizume, Davidd G Rosado,
Eduardo Fernandez Mendina and Eduardo Fernadez. An analysis of Security
Issues for Cloud Computing. Journal of Internet Services and
Applications. A Springer Open Journal
4:5 , pp. 1-13, 2013
[18]
Aboul Ella Hassanien and Mohamed
Elhoseny. Cybersecurity and Secure Information Systems. Advanced
Sciences and Technologies for Security Applications. Springer Nature.
Switzerland, 2019. DOI:10.1007/978-3-030-16837-7
Citation
Shailendra Giri, Subarna Shakya, "High Risk of Cybercrime, Threat, Attack and Future Challenges in Nepal," International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.46-51, 2020.